classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Control physical access to rack level
August 2018, This Week's Editor's Pick, Access Control & Identity Management, Asset Management, EAS, RFID, IT infrastructure

With reports of widespread data breaches in the global spotlight, data centre managers are under increasing pressure to ensure that access to restricted information is protected.

Cybersecurity remains a number one priority, but in many cases, data breaches occur as a result of physical access to that data in some way. Within the data centre environment, preventing unauthorised physical access to sensitive data is crucial.

Electronic locks offer audit trail reporting capabilities and can also be set up to provide local alerts, including indicator lights, beacons or alarms.

Securing information within the data centre presents heightened physical security and access control challenges. Heavy-duty perimeter security and room level access control prevents access to the building and server rooms, but once inside, data storage equipment may not include that same level of security. In some co-location centres for instance, cabinets containing particularly sensitive data are protected by a chain link fence enclosure; however, these cabinets are still at risk should an unauthorised individual gain access to that enclosure.

Given that a large percentage of security breaches are perpetrated by insiders, this level of security is insufficient. Strictly enforced regulations, such as the USA’s HIPAA (the Health Insurance Portability & Accountability Act), SOX (Sarbanes Oxley), FISMA (the Federal Information Security Management Act) and CIP (the Critical Infrastructure Protection Act), require sufficient physical security measures to prevent unauthorised access to sensitive data.

For complete physical security, the actual server cabinets should be secured to the same degree as the data centre itself. Verification of credentials for access control and, where required, auditing rack-level access can prevent costly data breaches and stiff penalties for non-compliance. Data centre managers can avoid these risks by incorporating intelligent, reliable electronic locking systems at the rack-level to protect access to sensitive information.

Intelligent locking systems

Effective rack-level access control systems are specifically designed for server cabinets with a flexible, open architecture that allows them to be easily integrated with any existing security system. An effective physical security system is typically comprised of three key elements: user interface, intelligent lock, and remote control and monitoring.

High-quality, reliable electronic locks are critical to the successful operation of a complete solution. Intelligent locks grant access only to validated users and can also provide electronic outputs for external security monitoring and auditing. The user interface validates the user credential, which is authenticated by an access controller and signals the electronic lock to open. Electronic locks can be operated through a variety of access control devices, such as digital keypads, biometric readers and wireless based solutions such as RFID and Bluetooth.

Electronic access provides a method to identify which racks have actually been accessed – by whom, when and for how long. Once access is triggered by an electronic signal, a digital signature is created and archived for future audit trail reporting, either on site or remotely. Indicator lights, beacons or alarms can also be set for local alerts. Electronic access records are particularly useful when security compliance requirements call for the submission of an audit trail report. This data can also facilitate investigation should a data breach occur.

Additionally, maintaining automatic digital documentation is more convenient than manually tracking and recording access. Rather than keeping track of mechanical keys – particularly in a co-location setting – electronic access allows administrators to upload (or delete) electronic credentials from their user database. With networked systems, these updates to the approved list can be made remotely, from anywhere in the world. With cloud-based solutions, this can be accomplished wirelessly, using Bluetooth-enabled mobile devices.

Rack-level electronic access solutions

Since different data storage environments have their own unique security requirements, tailoring electronic access solutions to the needs of a data centre’s existing infrastructure is essential. An experienced electronic access solutions provider will recommend only the level of complexity that makes sense for the application, and should be able to retrofit the new devices to existing cabinets and security systems. There are numerous solutions for upgrading existing security systems to incorporate rack-level security.

Self-contained solutions for instance, are the simplest form of electronic access. These solutions provide simplified key management in a battery-powered device that is easy to install, and provides electromechanical locking and access control in one package, with no wiring involved. Standalone solutions are another option that provides local plug-and-play access control, independent of any network. Standalone solutions do not typically require any software for operation but cannot be accessed remotely.

Integrated solutions on the other hand, offer cabinet level access control that can be integrated with building access control and monitoring systems, extending an existing networked access control system down to the rack level. Networked solutions can also be used to monitor and manage multiple rack access points from a host computer for remote system configuration, access control and monitoring, independent of external security systems.

Streamlining migration between platforms

Rack-level electronic locks may incorporate an RFID reader with industry standard Wiegand outputs that can tie into any traditional building system. When integrating rack-level access control solutions, there may be a need to support both proximity and smart card RFID protocols. By integrating an industry standardised electronic locking and access control solution that reads multiple RFID formats, data centre managers can leverage their existing building security system for rack-level access control regardless of card technology used. This type of solution offers simplified installation, allowing personnel to use their existing credentials to access multiple areas within the data centre – from the server room to the rack level.

Electronic locks like Southco’s H3-EM Swinghandle series is available with a card reader that reads multiple card formats, providing a higher level of security and facilitating the transition to new security technologies used to manage access to keyless entry points at the rack level.

Electronic access solutions with the ability to read multiple formats allow the cabinet to be opened with any type of card, from RFID to iCLASS, simplifying access control and providing the data centre manager with greater flexibility and the ability to easily migrate from Prox to smart-card based systems. By using an intelligent lock that supports multiple RFID readers, data centres can maintain a higher level of security and facilitate the transition to new security technologies used to manage access throughout the data centre.

Physical access control across the facility

In today’s highly regulated data centre environment, access control and monitoring at the rack level are a must. While significant resources are dedicated to fighting online cyberattacks, physical protection of stored data is equally as important. The need for increased security and compliance with a myriad of regulations necessitate access control and monitoring capabilities for the actual cabinets where data is stored.

Data centre managers can achieve physical access control by implementing electronic access solutions, which offer solutions for audit trail maintenance and compatibility with existing facility-wide security systems. Protecting data within facilities requires the same level of access control for racks as the buildings that house them.

For more information, contact Andrew Williams, Astra Fasteners, +27 11 918 6696, andrew.williams@astrafasteners.co.za, www.astrafasteners.co.za.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Managing who, what and why
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security
    Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • A better approach to fingerprint biometrics
    November 2018, This Week's Editor's Pick, Access Control & Identity Management
    Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.
  • The right access decisions
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management
    Making the right access control decision depends on what you want secured and how secure it should be.
  • IP is no stranger to access control
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Just as the surveillance market made the move to IP-based communications, the access control market is also moving to IP (or some say it already has).
  • Identifying good visitor management practices
    November 2018, Excellent ID, Access Control & Identity Management, Asset Management, EAS, RFID
    There are a number of factors that security managers need to consider when implementing visitor management and access control protocols.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.